Analysis

  • max time kernel
    119s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 23:26

General

  • Target

    36f50b0fb87bf8de18c6b311a561a347e51493be1765cf31a90851ccd58764dcN.exe

  • Size

    66KB

  • MD5

    524b4dbbf6347f7cf45519fdef6d50a0

  • SHA1

    eaf3cb12511b5fab6d28dad164b63513ea85f5f1

  • SHA256

    36f50b0fb87bf8de18c6b311a561a347e51493be1765cf31a90851ccd58764dc

  • SHA512

    4f223b9974fb21692b3059153b2c0854f3ff72639c0b042f43e31c315dfead18172d968cf51edb1143b523f8bba9c1698aeda43b68dd68f5b006abdc1e1404b8

  • SSDEEP

    1536:gQTIubHy5wQoJAejpzkGdxDLw3qMnd1YzHgLaj6:R4wfZpzNdxDL25Ew

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36f50b0fb87bf8de18c6b311a561a347e51493be1765cf31a90851ccd58764dcN.exe
    "C:\Users\Admin\AppData\Local\Temp\36f50b0fb87bf8de18c6b311a561a347e51493be1765cf31a90851ccd58764dcN.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Program Files (x86)\497abeae\jusched.exe
      "C:\Program Files (x86)\497abeae\jusched.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:5004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\497abeae\497abeae

    Filesize

    13B

    MD5

    f253efe302d32ab264a76e0ce65be769

    SHA1

    768685ca582abd0af2fbb57ca37752aa98c9372b

    SHA256

    49dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd

    SHA512

    1990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4

  • C:\Program Files (x86)\497abeae\jusched.exe

    Filesize

    66KB

    MD5

    2c586b99061384af2bc87befd5db3186

    SHA1

    24d2ad1337a3cdcb18210534aba6b97d77066501

    SHA256

    b45a46f6e204bc794a4c13d6bcd38c709f60256867d5f2ee0210551dbce0c6c3

    SHA512

    f25d9c858c2d5618bf4c756dfae11dd5313e8969940a1b56aeb270aa3d703d31a81a635b2a92d1a8f7b04ab5106c00a789daee0d9548ab954f39f63c813d7b87